xfs_setattr_size is mid-stack during log-flooding stack traces

Eric Sandeen sandeen at sandeen.net
Mon Oct 27 00:06:35 CDT 2014


See "[vfs] WARNING: CPU: 3 PID: 2339 at mm/truncate.c:758 pagecache_isize_extended+0xdd/0x120()" sent earlier today.

-Eric

> On Oct 26, 2014, at 10:21 PM, "Michael L. Semon" <mlsemon35 at gmail.com> wrote:
> 
> Hi!  I was having fantastic luck with v5/finobt XFS and kernel
> 3.18.0-rc1, so I decided to disable quota support and debug support
> in XFS...
> 
> [    0.000000] Linux version 3.18.0-rc1+ (root at kyhorse) (gcc version 4.8.3 (GCC) ) #5 SMP Sun Oct 26 14:43:09 EDT 2014
> # i686 Pentium 4, BTW.
> [    0.857655] SGI XFS with ACLs, security attributes, no debug enabled
> 
> Some other debug items were shut off as well.
> 
> Now, my logs are getting pelted with items that look like this (first trace,
> on boot):
> 
> [   14.549583] XFS (sda1): Mounting V5 Filesystem
> [   14.810908] XFS (sda1): Ending clean mount
> [   14.826918] mount (155) used greatest stack depth: 6056 bytes left
> [   15.139152] rc.S (64) used greatest stack depth: 5948 bytes left
> [   29.443780] ------------[ cut here ]------------
> [   29.443801] WARNING: CPU: 0 PID: 387 at mm/truncate.c:758 pagecache_isize_extended+0x124/0x129()
> [   29.443809] CPU: 0 PID: 387 Comm: gtk-query-immod Not tainted 3.18.0-rc1+ #5
> [   29.443813] Hardware name: Gateway                         E-2000                         /D845GRG                        , BIOS RG84510A.15A.0009.P03.020
> [   29.443817]  00000000 00000000 ee1e9e20 c144939c 00000000 ee1e9e50 c1031b03 c154f66c
> [   29.443828]  00000000 00000183 c1553739 000002f6 c1098458 c1098458 e849ed54 00000000
> [   29.443838]  00001000 ee1e9e60 c1031bb8 00000009 00000000 ee1e9e98 c1098458 efd69100
> [   29.443848] Call Trace:
> [   29.443858]  [<c144939c>] dump_stack+0x41/0x52
> [   29.443867]  [<c1031b03>] warn_slowpath_common+0x6f/0x86
> [   29.443873]  [<c1098458>] ? pagecache_isize_extended+0x124/0x129
> [   29.443878]  [<c1098458>] ? pagecache_isize_extended+0x124/0x129
> [   29.443884]  [<c1031bb8>] warn_slowpath_null+0x1d/0x1f
> [   29.443889]  [<c1098458>] pagecache_isize_extended+0x124/0x129
> [   29.443895]  [<c1098494>] truncate_setsize+0x37/0x50
> [   29.443902]  [<c117c534>] xfs_setattr_size+0x13d/0x3d6
> [   29.443909]  [<c116a2ed>] ? __xfs_get_blocks+0x5ff/0x5ff
> [   29.443916]  [<c1172c13>] xfs_file_fallocate+0x2fe/0x340
> [   29.443922]  [<c1444ccc>] ? kmemleak_free+0x20/0x43
> [   29.443931]  [<c10ba00d>] ? kmem_cache_free+0x76/0xc4
> [   29.443938]  [<c10bd802>] do_fallocate+0x111/0x18a
> [   29.443943]  [<c10bd8cb>] SyS_fallocate+0x50/0x70
> [   29.443950]  [<c144f6ef>] syscall_call+0x7/0x7
> [   29.443954] ---[ end trace 281f0f955c16f86c ]---
> 
> In an xfstests run, it seemed to start with generic/012 and hit a
> great many tests after that.  The actual BUG_ON is somewhere in
> mm/truncate.c, though...
> 
>        WARN_ON(!mutex_is_locked(&inode->i_mutex));
> 
> Is this an XFS issue at all?  Or is there some kind of extra
> precaution that has to be taken on the XFS side?  Feel free to toss
> me over to mm to ask, "What is this?"
> 
> Thanks!
> 
> Michael
> 
> _______________________________________________
> xfs mailing list
> xfs at oss.sgi.com
> http://oss.sgi.com/mailman/listinfo/xfs
> 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://oss.sgi.com/pipermail/xfs/attachments/20141027/800865ea/attachment.html>


More information about the xfs mailing list